Issues Raised by the US Patriot Act and Library Policy Considerations December 11, 2002 Satellite Teleconference, Safeguarding our Patron’s Privacy, Cosponsored by AALL, ALA, ARL, MLA, SLA See www.arl.org/patriot/ Presentation to the UIUC Library Faculty January 21, 2003 By Paul D. Callister, JD, MSLIS Law Reference Librarian and Assistant Professor of Library Administration THE FOLLOWING OUTLINE IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY AND SHOULD NEITHER BE CONSTRUED AS UNIVERSITY LIBRARY POLICY NOR LEGAL ADVICE NOR RELIED UPON IN LIEU OF CONSULTATION WITH LEGAL COUNSEL. I. What are the Issues for Libraries? A. Scope of Inquiry 1. More than Just Patriot Act: Sausage affecting 15 other acts: a) Electronic Communications Privacy Act of 1986 (ECPA) b) Computer Fraud and Abuse Act of 1986 (CFFA) c) Foreign Intelligence Surveillance Act of 1978 (FISA) d) Family Educational Rights and Privacy Act of 1974 (FERPA) e) Cable Television Consumer Protection and Competition Act of 1992 f) Omnibus Crime Control and Safe Streets Act of 1968 (Wire Tap Statute) 1 g) Federal Rules of Criminal Procedure 2. Influenced by the Times (Probable v. Possible) and Changes in Law Enforcement Policy a) 9/11 (introduced less than a week after 9/11 and signed into law Oct. 26, 2001). b) Attorney General John Aschoft issued revised Guidelines on General Crimes, Racketeering Enterprise and Terrorism Enterprise Investigations (“FBI Guidelines”) (1) From “’specific and articulable facts’ indicating criminal activity” to “’reasonable indication’ of criminal activity” to “prompt and extremely limited checking leads”, “preliminary investigations” (up to 180 days), “criminal intelligence investigation” for years involving “interrelation of various sources and types of information.” (2) At issue: searching the Internet, use of private sector databases, attendance at public events.1 3. Other Law and Regulations Pertaining to Warrants, Court Orders, Wire Taps, and Court Orders a) State and Federal b) Case Law c) Agency Regulations and Rules (1) Federal Rules of Criminal Procedure 4. Consider Issues in Two Capacities a) Services to Patrons and University b) Employer 5. Consider with respect to crime, terrorism and 1 ELECTRONIC PRIVACY INFORMATION CENTER, THE ATTORNEY GENERAL’S GUIDELINES, at http://www.epic.org/privacy/fbi/ (last updated Dec. 2, 2002). 2 intelligence gathering a) Evidence of the Crime b) Commission of the Crime (Computer Tresspass) B. Major Issues 1. In General a) Use of Warrants and Court Orders as Opposed to Subpoena b) Application of Various Law to Libraries c) Records Retention, Signage and Resource Usage Policy d) Withdrawal of US Government Information (1) Additional FOIA exeptions e) Voluntary Disclosure f) Probability v. Possibility 2. Use of Warrants and Court Orders as Opposed to Subpoena a) Quiz b) Warrants (1) For a variety of information types (a) Basic Subscriber or Customer Information (b) Transaction and Account Information (c) Email (d) Stored Voice Mail (transmitted via computer) (e) Non-electronic (not on chart—18 USC 3103(a) “seize any property that constitutes evidence of criminal offense” 3 (2) Extended Use (See NJ Article and Table) (a) Nationwide for investigation of domestic or international terrorism (any district in which activities related to the terrorism may have occurred) (b) Extended “basic subscriber or customer information” to include items computer network information (i.e., payment information, session times and duration, identity or temporary network addresses, email headers, etc.) See 18 USC 2703 (c)(2) (i) What is “content?” (a) Email headers (b) Web addresses (ii) Anywhere in the address chain (c) NJ Law Rev. Article (3) Higher Standard (“Probable Cause”) (4) Technical Issues of Execution of a Warrant (a) Refusal (i) Punishable by (a) Courts with Contempt Power (b) Obstruction of Execution of Process (Criminal Offense) (ii) What constitutes refusals: (a) To move (b) Refuse entry (c) Entering Premises after being told not to (d) “secreting” object of search after learning of warrant (iii) Defenses 4 (a) in some jurisdictions, invalid or irregular warrant is not invalid if valid on its face (b) Use of Force and “Knock and Announce” Rules (i) Constitutional limitation (“unreasonable search and seizure”) (a) “must be judged by their reaction to the circumstances as they reasonably appear to exist to trained law enforcement officers when the decision to enter was made.” (b) Generally, “knock and announce” rule (meaning “reveal identity to the owner, occupant or one in rightful possession of the property to be searched or thing seized” (but see (b)) (c) Unless required by statute, no requirement to exhibit, read, or even have warrant in possession (d) “Destruction of property that is not reasonably necessary to execute” the warrant (e.g., leaving cigar and ashes in bed is not ok, breaking lock on gun vault is ok) (ii) Illinois Law (a) Must knock and announce “absent exigent circumstances” (i) Armed or sign of violence (ii) Probable cause (iii) Defendant is present (iv) Danger to police (v) Nature of object of warrant (vi) Ease of destruction of 5 evidence (vii)Probability of escape (viii) Useless gesture (b) No Knock Warrants (c) “Failure to announce” is not a per se constitutional violation (but is a factor) (d) Must leave copy of warrant for items seized (c) Who my Execute (i) Federal civil officer “authorized to enforce or assist in enforcing any federal law” (ii) Persons authorized by the president (iii)City police (often have county countywide jurisdiction) (iv) State use of National Guards (v) Illinois Judge may designate specific individual (d) When (i) Time may be fixed by Judge or by Statute (ii) May be at night (a) Federal—in day time unless for “reasonable cause” authorized at night (e.g., destruction of evidence, armed and dangerous, flight) (b) Illinois—at any time (day or night) (iii)Within reasonable time (a) Illinois (general within 96 hours) 6 (e) Scope—Where, What and Who (i) Search wrong place is a search without a warrant. (ii) General searches are prohibited (iii)Unnamed items may be seized if “in plain view, and reasonably believe constitute evidence of a crime” or if “receptacle of a described item (computer)” or “sufficient nexus to the described items” or “not practical to sort through items on the premises” (iv) Unnamed persons—searched only if independent probably cause (a) “furtive gestures and emotions” (b) Often warrant will authorize search any person on premises and will name individuals (c) Detention, apart from search, is generally permitted (to protect from attack, destruction and concealment of evidence) (f) Remedies for Unconstitutional or Unreasonable Searches (i) Quash evidence—for the defendants (ii) Motion for Return of property (a) Must show entitled to possession (b) Can ask for receipt (iii) Money Damages (a) could loose right to if search was with consent (actual or apparent authority) (b) not whether injury was done to property, but rather the officers executed search in a “reasonable 7 and orderly manner” (i) Being able to view the search is important (ii) Not liable for removing obstructions if careful and orderly manner and not guilty of wanton destruction of property (iv) Personal liability of agent or officer (a) qualified immunity in some states (if reasonable officer possessing the same information believed search was lawful) (b) good faith that warrant was valid (v) Malicious procurement of warrant or wrongfully causing or conducting a search is a crime in some states c) Court Orders (1) Kinds (see table) (a) Contents of wire or electronic information (with notice, unless motion otherwise, to subscriber or customer, which is unlike warrant) 18 USC 2703(b) (b) Records of electronic communication service or remote computing service (without notice) 18 USC 2703(c)—addresses, headers (what is content?) (c) Pen/Trap Order 18 USC 3122 or 50 USC 1842 (FISA order) (real-time dialing, signaling info, address, ports, headings). (d) Real time communications (content) via secret FISA orders (2) Standard to get is lower (a) “Specific and articulable facts”—contents or records of wire or electronic information or remote computing service (b) For non-FISA Pen/Trap Order “Relevant to an 8 ongoing criminal investigation” (c) For FISA Pen/Trap Order—not a US citizen or concerns protection against terrorism and intelligence activities (“not solely based upon conduct protected under the first amendment”) (3) Non disclosure requirement for Pen Registers and Traps (4) Compliance with Order (a) Presumably must be able to read and respond as dictated (i) Who addressed to (ii) Timing (iii)Items to be seized or persons and communications covered by Pen Register or Trap (b) Threat of Contempt of Court (c) Obstruction of Execution of Process (d) Must provide assistance in installation of pen registers and traps (5) Remedies (a) For Wire or Electronic Communications or records concerning such--Motion by Service provider that (i) information or records requested are unusually voluminous in nature or (ii) compliance with such order would cause an undue burden (b) Reimbursement for costs (c) Civil actions for abuse d) Subpoena (1) Easiest to obtain 9 (a) “relevant to the investigation” (b) FISA order (i) “any tangible things (including books, records, papers, documents, and other items) for an investigation to obtain foreign intelligence information not concerning a United States person or to protect against international terrorism or clandestine intelligence activities, provided that such investigation of a United States person is not conducted solely up on the basis of activities protected by the first amendment” (ii) Non disclosure requirement (2) Generally time to respond to subpoena 3. Application to Libraries a) In General—Library-Patron Privilege (1) May be statutory protections (although federal law overrides) see http://www.ala.org/alaorg/oif/stateprivacylaws.html (a) 75 ILCS 70/1—registration and circulation records of a library are confidential (must have a court order) (b) 5 ILCS 140/7—exempts “library circulation and order records identifying library users with specific material” from FOIA requests (2) Library-patron privilege is trumped by “states interest in well-founded criminal charges and the fair administration of criminal justice.” Brown v. Johnson, 328 N.W.2d 510, 512-13 (Iowa 1983), cert denied. True even though investigation was “only preliminary,” “no suspects were identified,” and information was not limited “to any named library patrons.” Subpoena sought “records of all persons who have checked out certain books” dealing with witchcraft and related topics. (3) Library-patron privilege is more likely to trump 10 when it is a civil suit (seeking identities of defendants) that is the basis for the subpoena. See Quad/Graphics v. Southern Adirondack Library System, 664 N.Y.S. 2d 225 (NY Sup. Ct. 1997). “Library, as the unique sanctuary of the widest possible spectrum of ideas, must protect the confidentiality of its records in order to insure its readers’ right to read anything they wish, free from fear that someone might see what they read and use this as a way to intimidate them.” (a) Illinois court order could permit under 5 ILCS 140/7. b) With Respect to Disclosure of Content or Records by Electronic Communications Services or Remote Computer Services (1) Bohach v. City of Reno, 932 F. Supp. 1232 (D. Nev. 1996). Officers sought halt of investigation into misuse of computer paging system. One of the legal issues was whether the city and Reno Police Department was a “provider of electronic communications service” under a 18 USC 2701 (related to section 2703 amended by the Patriot Act). District court found that they were ruling “the Reno Police Department’s terminals, computer and software, and the pagers it uses to its personnel, are, after all, what provide those users with the ‘ability to send or receive electronic communications.’” (2) Crowley v. Cybersource and Amazon.com, 166 F. Supp. 2d 1263 (N.D. Cal. 2001). Distinguished between online merchant who communicates by email and an electronic communication service or remote computing service. (3) Implications for libraries (a) if we enable electronic communication for our patrons or employees with software or computer hardware, we may be found to be an electronic communications service and subject to compliance with warrants, orders and subpoenas of electronic information. 11 (b) How does our “no email” on public terminal policy affect this? (c) Even if we are not a “provider of electronics communications service” are we a “remote computer service”? We provide internet access and our online catalog, ILL, and databases permit patrons to save information (searches, etc.). (d) How do services such as “remember search,” “remember titles,” digital ILL, clip searches affect us? (e) Do circulation records themselves fall within these sections? Not as records, but maybe as content subject to 18 USC 2703(b). 4. Records Retention, Signage and Resource Usage Policy a) Why worry? (1) Because we don’t want to be found to be an electronic communications service or remote computer service. (a) Litigation strategy (not a response to an officer with a warrant) (b) Preserves reader’s rights (2) May have limited effect because of other applicable law. b) Limit amount of work to comply c) How do we show entitled to documents, records, computer equipment, etc. d) Offset reaction by other needs (i.e., use email and to acquire information) e) Weigh the probability 5. Withdrawal of Government Information a) Organizations and Sites tracking removed information 12 (1) OMB Watch http://www.ombwatch.org/article/articleview/213/1/10 4/#agency (2) Additional FOIA exceptions 6. Voluntary Disclosure a) Way to limit liability (?) b) Signage 7. Probability v. Possibility a) Less Likely (1) Few examples in the case law to draw from (2) Are libraries electronic communications services or remote computer services? b) More Likely (1) 9-11 (2) More Aggressive Law Enforcement Policies such as the Attorney General Guidelines II. Our Library Policy A. Current Draft Guidelines dated 10/21/02 1. Do they adequately address distinction between Warrants, Orders, and Subpoena? a) Failure to announce b) Failure to bring or present warrant c) Stepping away (compare to ALA guidelines) without anything further d) Moving if ordered e) Not entering if so ordered 13 f) Detention of and searches of persons g) Complying with order for “immediate” delivery h) Risk of contempt of court or obstruction of execution of process 2. Do they address the different issues of investigations of patrons v. investigations of employees? a) Investigations of employees may more likely involve (1) searches of persons (2) detention of persons (3) failure to announce 3. Do they address issues such preventing damage or loss? Or limiting liability? a) Staying on premises b) Asking for receipt c) Asking for copy of warrant d) Not giving permission e) Voluntary disclosure to law inforcement 4. Do they address facilitating pen registers and traps? a) Who will assist and monitor b) Tracking hours for compensation c) Responding to voluminous requests 5. Are the guidelines readily accessible? 6. Are staff members being trained? 7. Should we adopt the ALA guidelines? Are they sufficient? 14 B. Records Retention, Signage, Resource Usage and other Policies 1. Does restricting email use on terminals help? 2. Does it interfere with information seeking process 3. What about catalog functions? Saved searches and titles? 4. What about ILL digital and other requests? 5. Can we easily prove possession of documents, records and equipment? 6. Address computer trespass a) Voluntary disclosure (warning) b) Other ways to limit exposure/liability (Patriot Act only protects with respect to ECPA) C. Tracking Information Removed by Government Agencies 1. Should we report it? 2. Who do we report to? 3. Compliance by depository libraries D. Role with Respect to Influencing Political Action 1. What forum and among what organizations should we address our concerns? 2. Encourage professional organizations and take a role in promoting legislation protecting the sanctity of the right to read (privacy and access to information) 15